Authentication & Verification
Classic 2FA / MFA
MFA for AD, LDAP, Databases
Wi-Fi Authentication
Electronic Visit Verification
Popular Integrations
Popular Integrations
Programmable hardware TOTP token in a card format that fits any authentication system
Classic hardware TOTP token with SHA-1 algorithm support
Programmable hardware TOTP token in a key fob format that fits any authentication system
Classic hardware TOTP token with SHA-256 algorithm support
Programmable hardware TOTP token in a card format that fits any authentication system
Classic hardware TOTP token with SHA-1 algorithm support
Programmable hardware TOTP token in a key fob format that fits any authentication system
Classic hardware TOTP token with SHA-256 algorithm support
A free 2FA authenticator app with cloud backup, easy token transfer to a new phone, PIN and biometric authentication protection
Free OTP delivery with chatbots in messaging apps
Delivery of one-time passwords via SMS messages
Free delivery of one-time passwords via email
Free one-time passwords delivery via push notifications
A free 2FA authenticator app with cloud backup, easy token transfer to a new phone, PIN and biometric authentication protection
Free OTP delivery with chatbots in messaging apps
Delivery of one-time passwords via SMS messages
Free delivery of one-time passwords via email
Free one-time passwords delivery via push notifications
Get Started
Classic 2FA / MFA
API Documentation
Software Development Kits
Get Started
Classic 2FA / MFA
API Documentation
Software Development Kits
The key benefit of the Protectimus SHARK TOTP hardware token is its support for the superior SHA-256 algorithm, which offers stronger protection against brute force attacks.
It’s important to note that standalone use of the Protectimus SHARK TOTP hardware token is not possible. A third-party system is required to verify the value generated from the MFA token to complete authentication.
You can use Protectimus SHARK with Protectimus Cloud Service or On-Premise Platform, or with any other 2FA service that supports SHA256 TOTP tokens.
At the moment, my assessment of the company’s work is 10 out of 10. An important factor in choosing this two-factor authentication provider was the possibility of customizing the 2FA system for our project. After we got in touch with the Protectimus team and explained the task, they implemented the necessary functionality for us free of charge. There were no problems. Everything works well.
Protectimus was chosen because of their unique Dynamic Strong Password Authentication (DSPA) technology. Using this product, we added 2FA to all the systems we needed to protect in one fell swoop, as it allowed us to integrate two-factor authentication services straight with Active Directory. We have been using the Protectimus two-factor authentication platform for a year and are satisfied with this product.
Over the past years, we’ve had only positive cases of working together. Protectimus helped us at every stage, from integration to adding additional features that solved our specific tasks. Using Protectimus, we are confident that Volet infrastructure and users are well protected. Protectimus gives us what money can’t buy – not a sense of security, but REAL security. I highly recommend it for implementation.
Weight | 16.1 g (0,57 oz) |
---|---|
Display | LCD 6 digits |
Algorithm | OATH compliant time based TOTP |
Cryptographics | SHA-256 |
Time interval | 30/60 seconds (Optional) |
Operating temperature | 0°C - 40°C (32°F - 104°F) |
Humidity | 0 - 90% without condensation |
Battery | 3-5 years |
Material | PC+ABS |
Physical resistance | IP67 |
Number of tokens you order | Price per token |
---|---|
1—99 | $14.99 |
100—499 | $14.49 |
500—999 | $13.99 |
1000—4999 | $12.99 |
5000 and more | $11.99 |
Press the button, the One-Time-Password code will appear on the screen.
The screen may go off because of the expiration of the OTP interval (i.e. 30 or 60 seconds), you can press the button again to generate a new code.
Input the code to the web page or application.
The screen will go off automatically once the code expires.
The SHA-256 algorithm offers superior security compared to SHA-1 due to several reasons. Firstly, it provides stronger collision resistance, making it more challenging for attackers to generate two different inputs that result in the same hash value. Secondly, SHA256 produces a longer 256-bit hash value, providing more security and making it more difficult for attackers to find a collision. Moreover, there are no known successful attacks against SHA256, whereas SHA1 has demonstrated weaknesses, including practical attacks that can produce collisions. As a result, the SHA256 algorithm is the recommended choice for cryptographic purposes and is ideal for use in TOTP security tokens.
The TOTP (Time-based One-Time Password) algorithm for two-factor authentication functions by merging a secret key with the present time to produce a one-time password (OTP). In Protectimus SHARK this password is generated using the SHA-256 hash function, which produces a fixed-length output of 256 bits. The use of SHA-256 makes the TOTP algorithm more secure and less susceptible to attacks, as it is a highly secure hash function that is widely used in various security protocols and applications. The OTP is only functional for a brief stretch of time, which is 30 seconds in the case of Protectimus SHARK, after which a new OTP is created. In order to configure TOTP authentication, it is vital for the device of the user and the authentication server to have the same secret key.
The classic TOTP hardware 2FA tokens come with secret keys that are pre-installed by the manufacturer and cannot be altered. When a user obtains their TOTP hardware token from a vendor, the secret key must be added to the authentication server, which may require the end-user or their system admin to be granted access to the validating server, which is not always feasible. Protectimus SHARK tokens are classic TOTP hardware tokens, you may use them with Protectimus two-factor authentication system or any other authentication system that supports OATH standards.
The Protectimus SHARK TOTP hardware token is an excellent choice for 2FA, providing exceptional security features by supporting TOTP (RFC 6238) and SHA-256 algorithms, meeting OATH standards. The most significant advantage of the Protectimus SHARK TOTP hardware token is its support for the superior SHA-256 algorithm, which provides better protection against cyber attacks.The Protectimus SHARK 2FA security token is an extremely dependable method of authentication. These TOTP hardware tokens function offline, making them impervious to hacking and interception of one-time passwords. Additionally, they have a robust construction and are waterproof, which ensures they have a lifespan of 3 to 5 years.
Protectimus Ltd
Carrick house, 49 Fitzwilliam Square,
Dublin D02 N578, Ireland
Ireland: +353 19 014 565
USA: +1 786 796 66 64
Protectimus Ltd
Carrick house, 49 Fitzwilliam Square,
Dublin D02 N578, Ireland
Ireland: +353 19 014 565
USA: +1 786 796 66 64